MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9480e8b5b5d3b10d6d8ce91c81a260057d8c22740960960a05cc338b3c8e3073. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: 9480e8b5b5d3b10d6d8ce91c81a260057d8c22740960960a05cc338b3c8e3073
SHA3-384 hash: e06c378b20d4d9ed6861408195d73be0a30f5045d754bf845c9f983d2fee82c34f94fc1aace6f4cda173717292916f08
SHA1 hash: 7389d6eeb571bfa4731a06deb9535996d2c1828f
MD5 hash: 249afc0c47910087eb313fb999b7bc4c
humanhash: moon-gee-gee-magnesium
File name:file
Download: download sample
Signature RedLineStealer
File size:392'704 bytes
First seen:2022-11-21 09:40:25 UTC
Last seen:2022-11-22 08:23:19 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 6144:+iWKESG24OQjFnM6X4nLlHxmbxS5t8EovmIi+IJmk9nSTtT6V12RBq1DooGHp38V:6SG1InLlakHoOIizLdgswRBq1iJ8
TLSH T17D84BE4AB690CE00D7982E75E1E71A39E7A5E4873273E34F2F8921956D433F18C897C6
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter andretavare5
Tags:exe RedLineStealer


Avatar
andretavare5
Sample downloaded from https://www.prevenzioneformazionelavoro.it/12/AnlzrTlnr23985.exe

Intelligence


File Origin
# of uploads :
144
# of downloads :
188
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2022-11-21 09:41:13 UTC
Tags:
loader trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Running batch commands
DNS request
Creating a file in the %temp% directory
Creating a window
Searching for synchronization primitives
Launching a process
Using the Windows Management Instrumentation requests
Reading critical registry keys
Changing a file
Query of malicious DNS domain
Sending a TCP request to an infection source
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CryptOne, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Detected VMProtect packer
Drops PE files with benign system names
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect virtualization through RDTSC time measurements
Tries to steal Crypto Currency Wallets
Yara detected CryptOne packer
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 750669 Sample: file.exe Startdate: 21/11/2022 Architecture: WINDOWS Score: 100 114 Multi AV Scanner detection for domain / URL 2->114 116 Malicious sample detected (through community Yara rule) 2->116 118 Antivirus detection for URL or domain 2->118 120 11 other signatures 2->120 11 file.exe 6 2->11         started        14 dllhost.exe 2->14         started        17 explorer.exe 2->17         started        19 2 other processes 2->19 process3 file4 80 C:\Windows\Temp\16.exe, PE32 11->80 dropped 82 C:\Users\user\AppData\Local\...\file.exe.log, CSV 11->82 dropped 21 16.exe 1 11 11->21         started        26 conhost.exe 11->26         started        150 Antivirus detection for dropped file 14->150 152 Multi AV Scanner detection for dropped file 14->152 154 Machine Learning detection for dropped file 14->154 156 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 17->156 28 WerFault.exe 17->28         started        30 WerFault.exe 19->30         started        signatures5 process6 dnsIp7 86 94.26.226.51, 49712, 80 PTC-YEMENNETYE Russian Federation 21->86 88 idacoromania.ro 89.37.143.190 GTSCEGTSCentralEuropeAntelGermanyCZ Romania 21->88 90 blackhk1.beget.tech 5.101.153.227, 49713, 80 BEGET-ASRU Russian Federation 21->90 72 C:\Users\user\AppData\Roaming\...\svchost.exe, PE32+ 21->72 dropped 74 C:\Users\user\AppData\...\explorer.exe, PE32+ 21->74 dropped 76 C:\Users\user\AppData\...\J4610307C7LHAF1.exe, PE32 21->76 dropped 78 4 other malicious files 21->78 dropped 122 Multi AV Scanner detection for dropped file 21->122 124 Creates HTML files with .exe extension (expired dropper behavior) 21->124 126 Creates multiple autostart registry keys 21->126 128 Drops PE files with benign system names 21->128 32 J4610307C7LHAF1.exe 6 21->32         started        36 5GLL072H2ML7I44.exe 21->36         started        38 cmd.exe 1 21->38         started        40 4 other processes 21->40 file8 signatures9 process10 dnsIp11 64 C:\Windows\Temp\top1.exe, PE32 32->64 dropped 106 Machine Learning detection for dropped file 32->106 43 top1.exe 32->43         started        66 C:\Windows\Temp\swiftfix.exe, PE32 36->66 dropped 47 swiftfix.exe 36->47         started        50 explorer.exe 38->50         started        92 iplogger.org 148.251.234.83 HETZNER-ASDE Germany 40->92 68 C:\Windows\Temp\Lyla1911.exe, PE32 40->68 dropped 70 C:\Users\user\AppData\Local\Temp\d4Da.cpl, PE32 40->70 dropped 108 Antivirus detection for dropped file 40->108 110 Multi AV Scanner detection for dropped file 40->110 112 May check the online IP address of the machine 40->112 52 Lyla1911.exe 40->52         started        54 control.exe 40->54         started        file12 signatures13 process14 dnsIp15 94 chardhesha.xyz 194.9.70.250 GMHOSTUA Ukraine 43->94 96 api.ip.sb 43->96 130 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 43->130 132 Performs DNS queries to domains with low reputation 43->132 134 Machine Learning detection for dropped file 43->134 136 Tries to steal Crypto Currency Wallets 43->136 98 passport.yandex.ru 213.180.204.24 YANDEXRU Russian Federation 47->98 100 yandex.ru 5.255.255.60 YANDEXRU Russian Federation 47->100 104 3 other IPs or domains 47->104 84 C:\Users\user\AppData\Roaming\...\dllhost.exe, PE32 47->84 dropped 138 Creates multiple autostart registry keys 47->138 140 Antivirus detection for dropped file 50->140 142 Multi AV Scanner detection for dropped file 50->142 144 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 50->144 146 Tries to detect virtualization through RDTSC time measurements 50->146 56 WerFault.exe 50->56         started        102 185.215.113.216 WHOLESALECONNECTIONSNL Portugal 52->102 148 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 52->148 58 rundll32.exe 54->58         started        file16 signatures17 process18 process19 60 rundll32.exe 58->60         started        process20 62 rundll32.exe 60->62         started       
Threat name:
ByteCode-MSIL.Trojan.RealProtectPENGSD
Status:
Malicious
First seen:
2022-11-21 09:41:08 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
18 of 26 (69.23%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:lyla19.11 discovery infostealer miner persistence spyware stealer vmprotect
Behaviour
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Detectes Phoenix Miner Payload
RedLine
Malware Config
C2 Extraction:
185.215.113.216:21921
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
353e1bf0f0f4deb4203328160856d4e967a1fe36b4a5d126d799c1b7dee027c0
MD5 hash:
d5e60efb9108de74544c623538278585
SHA1 hash:
fc03eda03ca0510dfb26cf5ea1b3d4e6ff7567b7
SH256 hash:
21bec76acb48e7f62616ea677213b49ed58a930a4235eed5baf3dd58ec1bacc9
MD5 hash:
e5e1e721c9a7db6d6be9bee03f02c786
SHA1 hash:
9788811fdb842a3ae98083cf1be62098fb16b515
SH256 hash:
9480e8b5b5d3b10d6d8ce91c81a260057d8c22740960960a05cc338b3c8e3073
MD5 hash:
249afc0c47910087eb313fb999b7bc4c
SHA1 hash:
7389d6eeb571bfa4731a06deb9535996d2c1828f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments